This one was tricky because there was a globalroot path and a file name listed as userinit.exe under %systemroot%\system32 which in fact was us?rinit.exe!!! With the Command Prompt, I saw that strange name but not within the Windows Explorer resp. the Windows Explorer showed me that us?rinit.exe as a userinit.exe. Because you cannot use the question mark within file names in Windows it was highly possibly altered via Linux (question marks are allowed there) or some hex editor maybe.
Bad files found onto that system:
userinit.exe (us?rinit.exe), rundll32.exe (malware one), ntload.exe, clerma.dll
Here are some Screenshots: